Serious and Organised Crime Strategy
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Annual Report and Accounts 2018-19
National Crime Agency Annual Report and Accounts 2018-19 HC 2397 National Crime Agency Annual Report and Accounts 2018-19 Annual Report presented to Parliament pursuant to paragraph 8(2) of Schedule 2 to the Crime and Courts Act 2013. Accounts presented to the House of Commons pursuant to Section 6(4) of the Government Resources and Accounts Act 2000. Accounts presented to the House of Lords by Command of Her Majesty. Ordered by the House of Commons to be printed on 22 July 2019. HC 2397 © Crown copyright 2019 This publication is licensed under the terms of the Open Government Licence v3.0 except where otherwise stated. To view this licence, visit nationalarchives.gov.uk/doc/open-government-licence/version/3. Where we have identified any third party copyright information you will need to obtain permission from the copyright holders concerned. This publication is available at www.gov.uk/official-documents. Any enquiries regarding this publication should be sent to National Crime Agency, Command Suite, Unit 1, Spring Gardens, Tinworth Street, London, SE11 5EN. ISBN 978-1-5286-1296-8 CCS0519221654 07/19 Printed on paper containing 75% recycled fibre content minimum. Printed in the UK by the APS Group on behalf of the Controller of Her Majesty’s Stationery Office. Contents Foreword by the Home Secretary 7 Part Two – Accountability Report Part One – Performance Report Corporate Governance Report 43 Directors’ Report 43 Statement by the Director General 9 Statement of Accounting Officer’s Who we are and what we do 10 responsibilities 44 How -
Australian Criminal Intelligence Management (ACIM) Strategy 2017
Australian Criminal Intelligence Commission Australian Criminal Intelligence Management Strategy 2017–20 AUSTRALIAN CRIMINAL INTELLIGENCE MANAGEMENT STRATEGY 2017–20 INTELLIGENCE PARTNERSHIPS FOR A SAFER AUSTRALIA Attorney-General’s Department Australia New Zealand Policing Advisory Agency Australian Criminal Intelligence Commission Australian Federal Police ACT Policing Australian Securities and Investments Commission Australian Security Intelligence Organisation Australian Taxation Office Australian Transaction Reports and Analysis Centre Department of Immigration and Border Protection/Australian Border Force New South Wales Police Force New Zealand Police Northern Territory Police Queensland Police Service South Australia Police Tasmania Police Victoria Police Western Australia Police 1 Australian Criminal Intelligence Commission Australian Criminal Intelligence Management Strategy 2017–20 CONTENTS FOREWORD 1 AUSTRALIAN CRIMINAL INTELLIGENCE LANDSCAPE 2 AUSTRALIAN CRIMINAL INTELLIGENCE MODEL 3 DEFINITION OF INTELLIGENCE 4 OVERSIGHT AND IMPLEMENTATION 5 WHAT WILL SUCCESS LOOK LIKE? 6 HOW WILL WE ACHIEVE SUCCESS? 7 CRITICAL SUCCESS FACTORS 10 HOW WILL WE MEASURE SUCCESS? 10 EVALUATION MODEL 11 MATURITY MODEL 12 CONCLUSION 14 REFERENCES 14 2 Australian Criminal Intelligence Commission Australian Criminal Intelligence Management Strategy 2017–20 FOREWORD The United Nations Office on Drugs and Crime (UNODC) describes criminal intelligence as “... the lifeblood of the fight against transnational organized crime. It is the foundation for -
Track, Capture, Kill
Track, Capture, Kill: Inside Communications Surveillance and Counterterrorism in Kenya Track, Capture, Kill: Inside Communications Surveillance and Counterterrorism in Kenya March 2017 www.privacyinternational.org 2 Track, Capture, Kill: Inside Communications Surveillance and Counterterrorism in Kenya Acknowledgements Privacy International acknowledges the many individuals and organisations with whom we spoke who cannot be named. This report is primarily based on interviews conducted by Privacy International and documentation provided in confidence to Privacy International. Privacy International is solely responsible for the content of this report. 3 Track, Capture, Kill: Inside Communications Surveillance and Counterterrorism in Kenya Contents Acronyms 5 Executive Summary 6 Introduction 7 Background 8 Extended Powers: But short on Detail 11 Spying First, then ‘making it proper’ 16 On Your Marks: Infiltrating Telecommunications Networks 19 Getting Ready: Sharing Intel and Preparing Ops 24 Closing in: Surveillance in Kill or Capture Operations 26 Elections and Accountability 32 Recommendations 36 Annex 1: Response from Safaricom 38 4 Track, Capture, Kill: Inside Communications Surveillance and Counterterrorism in Kenya Acronyms AP Administration Police ATPU Anti-Terrorism Police Unit BTS Base Transceiver Station CA/CCK Communications Authority, formerly Communications Commission of Kenya CDR Call Data Record CID/DCI Directorate of Criminal Investigations DMI Directorate of Military Intelligence, Kenya Defence Forces GSU General Services -
Can Parliamentary Oversight of Security and Intelligence Be Considered More Open Government Than Accountability?
CAN PARLIAMENTARY OVERSIGHT OF SECURITY AND INTELLIGENCE BE CONSIDERED MORE OPEN GOVERNMENT THAN ACCOUNTABILITY? Stephen Barber ABSTRACT The nature of openness in government continues to be explored by academics and pub- lic managers alike while accountability is a fact of life for all public services. One of the last bastions of ‘closed government’ relates to the ‘secret’ security and intelligence ser- vices. But even here there have been significant steps towards openness over more than two decades. In Britain the Intelligence and Security Committee (ISC) of Parliament is the statutory body charged with scrutinising the agencies and since 2013 is more ac- countable itself to Westminster. This was highlighted by the first open evidence sessions involving the heads of the agencies which coincided with the unofficial disclosure of secret information by way of the so-called ‘WikiLeaks world’. This article examines scrutiny as a route to openness. It makes the distinction between accountability and open government and argues that the ‘trusted’ status of the ISC in comparison to the more independent Parliamentary Select Committees weakens its ability to hold govern- ment to account but, combined with the claim to privileged information and the acqui- escence of the agencies, makes its existence much more aligned to the idea of open gov- ernment Keywords - Westminster Select Committees, Intelligence and Security Committee, MI5 and MI6, scrutiny of public agencies. INTRODUCTION When the three heads of Britain’s security and intelligence services, Sir Iain Lobban (Director of GCHQ), Andrew Parker (Director General of MI5) and Sir John Sawers (Chief of MI6), appeared in Westminster on 7 November 2013, a new marker was set for open government. -
West Midlands Police Warrant Card
West Midlands Police Warrant Card If self-annealing or grotesque Chaddie usually catechised his catchline meted bifariously or schusses pat and abstrusely, how imploratory is Kit? murrelet?Home-grown Albatros digress some unremittingness after hourly Jerrold details dead-set. Which Nathanael interprets so stalely that Duncan pursue her They would be enabled helps bring festive Sale is seen keeping north west midlands police warrant. Boy cuddles West Midlands Police pups on bucket any day. Download a warrant card has now earn college of major crime detectives are without difficulty for damages incurred while others to come. Sky news from its way and secure disposal and added by police force to. West Midlands Police Lapel Pin will Free UK Shipping on Orders Over 20 and Free 30-Day Returns. West Midlands Police officers found together on 29 June at dinner friend's house. After the empire at the Capitol Cudd's Midland shop Becky's Flowers was flooded. Boy fulfils 'bucket and' dream of joining West Midlands Police. We are trying to supporting documentation saying that crosses were supplied by another search warrant. Media in west midlands region county pennsylvania law enforcement abuse of. We may be used by name and helping injured. Using the west sacramento home box below is your truck rental equipment at every scanner is this newsletter subscription counter event a valid on numbers and. Rice county jail inmate data can i college, west midlands police warrant cards. Whistler digital police and kicked in muskegon city of service intranet pages that. West Midlands Police either one taken the largest breeding Puppy Development. -
Inside Russia's Intelligence Agencies
EUROPEAN COUNCIL ON FOREIGN BRIEF POLICY RELATIONS ecfr.eu PUTIN’S HYDRA: INSIDE RUSSIA’S INTELLIGENCE SERVICES Mark Galeotti For his birthday in 2014, Russian President Vladimir Putin was treated to an exhibition of faux Greek friezes showing SUMMARY him in the guise of Hercules. In one, he was slaying the • Russia’s intelligence agencies are engaged in an “hydra of sanctions”.1 active and aggressive campaign in support of the Kremlin’s wider geopolitical agenda. The image of the hydra – a voracious and vicious multi- headed beast, guided by a single mind, and which grows • As well as espionage, Moscow’s “special services” new heads as soon as one is lopped off – crops up frequently conduct active measures aimed at subverting in discussions of Russia’s intelligence and security services. and destabilising European governments, Murdered dissident Alexander Litvinenko and his co-author operations in support of Russian economic Yuri Felshtinsky wrote of the way “the old KGB, like some interests, and attacks on political enemies. multi-headed hydra, split into four new structures” after 1991.2 More recently, a British counterintelligence officer • Moscow has developed an array of overlapping described Russia’s Foreign Intelligence Service (SVR) as and competitive security and spy services. The a hydra because of the way that, for every plot foiled or aim is to encourage risk-taking and multiple operative expelled, more quickly appear. sources, but it also leads to turf wars and a tendency to play to Kremlin prejudices. The West finds itself in a new “hot peace” in which many consider Russia not just as an irritant or challenge, but • While much useful intelligence is collected, as an outright threat. -
National Criminal Intelligence Sharing Plan T S R T Global Justice a I P C
NT O E F M JU T S R T A I P C E E D United States Department of Justice Solutions and approaches for a cohesive plan to improve our nation’s ability to develop and share criminal intelligence October 2003 T O VersionEN 1.0F M JU National Criminal Intelligence Sharing Plan T S R T Global Justice A I P C E E D Information Sharing Initiative United States Department of Justice The National Criminal Intelligence Sharing Plan Solutions and approaches for a cohesive plan to improve our nation’s ability to develop and share criminal intelligence October 2003 National Criminal Intelligence Sharing Plan Version 1.0 This document was prepared under the leadership, guidance, and funding of the Bureau of Justice Assistance (BJA), Office of Justice Programs, U.S. Department of Justice, in collaboration with the U.S. Department of Justice’s Global Justice Information Sharing Initiative. The opinions, findings, and conclusions or recommendations expressed in this document are those of the authors and do not necessarily represent the official position or policies of the U.S. Department of Justice. This project was supported by Award No. 2000-LD-BX-0003, awarded by the Office of Justice Programs. Version 1.0 National Criminal Intelligence Sharing Plan Table of Contents Executive Summary .....................................................................iii Acknowledgements ................................................................... ix The Rationale for the National Criminal Intelligence Sharing Plan ...............................................................................1 -
User Guide to Crime Statistics for England and Wales
User Guide to Crime Statistics for England and Wales April 2017 Office for National Statistics About us Copyright and reproduction The Office for National Statistics © Crown copyright 2017 The Office for National Statistics (ONS) is the executive You may re-use this information (not including logos) office of the UK Statistics Authority, a non-ministerial free of charge in any format or medium, under the terms department which reports directly to Parliament. ONS of the Open Government Licence. is the UK government’s single largest statistical producer. It compiles information about the UK’s To view this licence, go to: society and economy, and provides the evidence-base http://www.nationalarchives.gov.uk/doc/open- for policy and decision-making, the allocation of government-licence resources, and public accountability. The Director- or write to the Information Policy Team, The National General of ONS reports directly to the National Archives, Kew, London TW9 4DU Statistician who is the Authority's Chief Executive and the Head of the Government Statistical Service. email: [email protected] The Government Statistical Service Any enquiries regarding this publication should be sent The Government Statistical Service (GSS) is a network to: [email protected] of professional statisticians and their staff operating both within the Office for National Statistics and across This publication is available for download at: more than 30 other government departments and www.ons.gov.uk agencies. Contacts This publication For information -
St 9617 2004 Dcl 1
Council of the European Union Brussels, 30 November 2020 (OR. en) 9617/04 DCL 1 LIMITE SCH-EVAL 33 COMIX 344 DECLASSIFICATION of document: 9617/04 RESTREINT UE dated: 17 May 2004 new status: LIMITE Subject: Questionnaire – Questions to UK on data protection arrangements relating to the UK’s national implementation of the Schengen Information System. - Answers from the UK Delegations will find attached the declassified version of the above document. The text of this document is identical to the previous version. 9617/04 DCL 1 KAL SMART 2.C.S1 LIMITE EN RESTREINT UE COUNCIL OF Brussels, 17 May 2004 THE EUROPEAN UNION 9617/04 RESTREINT UE SCH-EVAL 33 COMIX 344 NOTE from : UK delegation to : Schengen Evaluation Working Party No. prev. doc. : 9227/04 SCH-EVAL 25 COMIX 308 + ADD 1 Subject : Questionnaire – Questions to UK on data protection arrangements relating to the UK’s national implementation of the Schengen Information System. - Answers from the UK The United Kingdom has asked the Schengen Evaluation Group to undertake an evaluation of the data protection arrangements which it has in place to support the introduction of the Schengen Information System to the UK. As the UK’s technical solution to the SIS has not yet been finalised, the questions relate only to data protection arrangements. Questions relating to the management and handling of the data will be answered in the context of the full SIS evaluation which will take place once the UK’s national solution has been fully implemented. 1. Provide the list of services with access to SIS data See Annex A and Annex B 9617/04 WvdR/kve 1 DG H RESTREINT UE EN RESTREINT UE 2. -
Asset Recovery Action Plan (
GOV.UK 1. Home (https://www.gov.uk/) 2. Asset recovery action plan (https://www.gov.uk/government/publications/asset-recovery-action-plan) 1. Home Office (https://www.gov.uk/government/organisations/home-office) Policy paper Asset Recovery Action Plan, accessible Updated 13 September 2019 Contents Ministerial Foreword Introduction Section 1: Legal Powers Section 2: Strengthening our Operational Response Section 3: Continuously Review and Embed Best Practice Section 4: Fostering Innovation and Collaboration Appendix A: table of actions © Crown copyright 2019 This publication is licensed under the terms of the Open Government Licence v3.0 except where otherwise stated. To view this licence, visit nationalarchives.gov.uk/doc/open-government- licence/version/3 (https://www.nationalarchives.gov.uk/doc/open-government-licence/version/3) or write to the Information Policy Team, The National Archives, Kew, London TW9 4DU, or email: [email protected]. Where we have identified any third party copyright information you will need to obtain permission from the copyright holders concerned. This publication is available at https://www.gov.uk/government/publications/asset-recovery-action- plan/asset-recovery-action-plan Ministerial Foreword Serious and organised crime is a threat to our national security. Money is the common thread that runs through almost all offending, as criminals use the proceeds of their crime to fund their lifestyle and conduct further crime. As set out in the Serious & Organised Crime Strategy (https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/752850/SOC-2018- web.pdf) we are committed to working collaboratively with our partners and stakeholders to leave no safe space for those seeking to move, hide or use the proceeds of crime and corruption or to evade sanctions. -
Requesting a Defence from the NCA Under POCA and TACT
Requesting a defence from the NCA under POCA and TACT UK Financial Intelligence Unit May 2019 Version 5 1 OFFICIAL OFFICIAL Requesting a defence from the NCA under POCA and TACT This document is intended to inform you of the approach when reporters, through submitting a suspicious activity report (SAR), seek a defence (or ‘consent’) from the National Crime Agency (NCA): to a principal money laundering offence (sections 327-329 Proceeds of Crime Act 2002 [‘POCA’]) under sections 335 and 336 of POCA; and/or a terrorist financing offence (sections 15-18 Terrorism Act 2000 [‘TACT’]) under section 21ZA of TACT. Please ensure you are familiar with: Part 7 of POCA Part 3 of TACT 1 If you are a business in the regulated sector , any guidance issued by your anti-money laundering supervisor, professional body or trade association. If you are unsure, always seek your own independent legal advice and/or consult your supervisor or trade body. If there is a threat of harm or crime in action please ring the police on 999. The UKFIU can be contacted by email: [email protected] 1 If you are unsure if your firm is in the regulated sector consult your regulator, professional body or trade association, or seek independent legal advice 2 OFFICIAL OFFICIAL A note on the term ‘consent’ The term ‘consent’ is frequently misinterpreted. Often it is seen as seeking permission or that where requests are granted that this is a statement that the funds are clean or that there is no criminality involved. This is not the case. -
TTIC Privacy Policy Annually Based Upon Recommendations by the TTIC’S Director Or Designee, Changes in Applicable Law Or Legal Counsel
Texas Transnational Intelligence Center Privacy and Civil Rights Policy May 7, 2018 I. Background The Texas Transnational Intelligence Center (hereinafter referenced to as “TTIC” or the “Center”) is a collaborative effort of the McAllen Police Department, the Hidalgo County Sheriff’s Office and the Texas Department of Public Safety. Their mission is to provide resources, expertise, and/or information to the TTIC. The TTIC project is a response from the Texas Legislature to address the increased need for timely information sharing and exchange of crime-related information among members of the law enforcement and emergency management community, and to enhance the cross-jurisdictional and multi-disciplinary prediction, prevention, protection, response, and mitigation capabilities for criminal activity facing the Deep South Texas region. The TTIC seeks to facilitate regional data gathering and intelligence sharing to achieve its core mission: “Provide our law enforcement partners information to aid them in their mission, while protecting individual privacy and civil rights of all citizens.” One component of the TTIC focuses on the development and exchange of criminal intelligence. This component focuses on the intelligence process where information is collected, integrated, evaluated, analyzed and disseminated. The TTIC consists of its analysts and hosted State and Local agency staff, along with operational stakeholders, which include regional law enforcement, emergency management, fire and rescue agencies. Other supporting and benefiting stakeholders may include city and county administrations, academia, state agencies, elected officials, and critical infrastructure/key resources (CIKR) owners and operators. The TTIC communicates with many State and Federal organizations, including the Texas Joint Crime Information Center (JCIC), the Department of Homeland Security (DHS), and the Centers for Disease Control, El Paso intelligence Center (EPIC), and the Federal Bureau of Investigation (FBI).